咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是3001-3010 订阅
排序:
Adaptive and iterative gene selection based on least squares support vector regression
收藏 引用
Journal of information and Computational Science 2006年 第3期3卷 443-451页
作者: Jiang, Jingqing Wu, Chunguo Song, Chuyi Liang, Yanchun Key Laboratory of Symbol Computation and Knowledge Engineering College of Computer Science and Technology Jilin University Changchun 130012 China College of Mathematics and Computer Science Inner Mongolia University for Nationalities Tongliao 028043 China Key Laboratory of Information Science and Engineering of Railway Ministry The Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing 100044 China
Cancer classification and identification are major areas in medical research. DNA microarrays could provide useful information for cancer classification at the gene expression level. The number of genes in a microarra... 详细信息
来源: 评论
Robust moving object segmentation in the compressed domain for H.264/AVC video stream
Robust moving object segmentation in the compressed domain f...
收藏 引用
25th PCS: Picture Coding Symposium 2006, PCS2006
作者: Yang, Gaobo Yu, Shengfa Zhang, Zhaoyang Network and Information Security Lab School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Electronic Science and Engineering National University of Defense Technology Changsha Hunan 410073 China Key Laboratory of Advanced Displays and System Application Shanghai University Ministry of Education Shanghai 200072 China
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employ... 详细信息
来源: 评论
Efficient Access Control in Wireless network
Efficient Access Control in Wireless Network
收藏 引用
Web Intelligence and Intelligent Agent Technology Workshops (WI-IAT)
作者: Kun Wang Zhenguo Ding Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China School of Remote Education Xidian University Xi'an China
To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algori... 详细信息
来源: 评论
Incentive model adapted to self-organizing management mode for resource sharing in P2P networks
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2006年 第11期34卷 2081-2084页
作者: Liu, Ye Yang, Peng Liu, Lin-Feng Xia, Qin Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
The self-organizing management mode in P2P networks leads to a large amount of selfish behaviors among peers. The corresponding solutions to this problem could hardly keep the merits of P2P network simultaneously, suc... 详细信息
来源: 评论
Advanced algorithm to P2P semantic routing based on the topologically-aware clustering in self-organizing mode
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2006年 第2期17卷 339-348页
作者: Liu, Ye Yang, Peng Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Structured P2P networks create a virtual topology on top of the physical topology. The only relation between the two layers is the hashing algorithm, which makes the node's logical ID independent of its physical l... 详细信息
来源: 评论
Improved traitor tracing scheme based on bilinear map
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2006年 第6期29卷 17-20页
作者: Zhang, Xue-Jun Zhou, Li-Hua Wang, Yu-Min Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Tô et al. presented a bilinear-map-based traitor tracing scheme with revocation, but it is a symmetric scheme because it does not provide non-repudiation. An improved Tô scheme was proposed using oblivious p... 详细信息
来源: 评论
P2P semantic routing model with match path and probability balance tree
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2006年 第10期17卷 2106-2117页
作者: Xu, Li-Bo Yu, Kun Wu, Guo-Xin Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Semantic routing is one of key parts in P2P routing researches. The intelligent search mechanisms support flexible semantic expression but hold low scalability and recall rate. Contrastively, semantic overlay network ... 详细信息
来源: 评论
Disaster recovery system model with e-government case study
收藏 引用
Natural Hazards Review 2006年 第4期7卷 145-149页
作者: Wang, Kun Li, Long-Hai Yuan, Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Xidian Univ. Ministry of Education Xi'an 710071 Shaanxi China Dept. of Computer Science and Technology Xidian Univ. Xi'an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ... 详细信息
来源: 评论
network pricing mechanism based on the utility characteristics of transport control protocol
收藏 引用
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni 2006年 第SUPPL.期45卷 54-58页
作者: Dong, Yong-Qiang Tu, Hao Key Laboratory of Computer Network and Information Integration College of Computer Science and Engineering Southeast University Nanjing 210096 China
Assuming a specific network service provider is in the position of natural monopolization, the pricing strategy most likely adopted by the provider is analyzed with the objective of profit maximization. The optimal pr... 详细信息
来源: 评论
Ternary Tree based Group key Management in Dynamic Peer networks
收藏 引用
International Conference on Computational Intelligence and Security
作者: Wei Wang Jianfeng Ma Sangjae Moon Key Laboratory of Computer Networks and Information Security Ministry ofEducation Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge an... 详细信息
来源: 评论